Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Design and implementation of Wireless Packet Level Authentication
2009 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Secure user authentication, authorization and access control have become the major challenges in any wireless security system, often due to certain wireless network characteristics such as lack of infrastructure, low power availability and mobility. Taking advantage of such network characteristics, an attacker can launch several security attacks like Denial of Service (DoS) attacks, packet spoofing and session hijacking attacks. Packet Level Authentication (PLA) provides an elegant network level solution to the aforementioned attacks by allowing every node in the network to validate the authenticity and integrity of a packet without any prior contact with the originator of the packet.

The cornerstone of PLA is public key cryptography based digital signature which is added do every outgoing packet by the packet originator. Therefore, signature generation and verification schemes of PLA become infeasible in resource-constrained devices if dedicated hardware accelerator is not used.

In this thesis, we present Wireless Packet Level Authentication (WPLA) that extends PLA to offer an adaptive hop-by-hop signature verification scheme. WPLA includes a lightweight signature verification approach for resource-constrained devices while retaining the public key cryptography based signature verification scheme for strong authentication. Furthermore, to ensure end-to-end data confidentiality over the unsecured channels, we integrate a symmetric encryption scheme along with secret key generation and distribution process. Finally, we implement the proposed solution and evaluate the performance of our implementation.

Place, publisher, year, edition, pages
2009. , 83 p.
Identifiers
URN: urn:nbn:se:kth:diva-11335OAI: oai:DiVA.org:kth-11335DiVA: diva2:274186
Presentation
(English)
Uppsok
Technology
Examiners
Available from: 2009-12-04 Created: 2009-10-27 Last updated: 2010-04-28

Open Access in DiVA

fulltext(43170 kB)958 downloads
File information
File name FULLTEXT01.pdfFile size 43170 kBChecksum SHA-512
b9cc862fe83cfaf122c63070961bfc3d6e1458730f5907b908924c7d1803ae80689f18aa9ddfaeaf513502265881784b6e9cd80165c4256cd993fbdfc4099fd9
Type fulltextMimetype application/pdf

Search outside of DiVA

GoogleGoogle Scholar
Total: 958 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 1090 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf